Rename VerifyAndSign* functions to VerifyAndEncrypt*
since that is a more accurate description (and it's what
the Shill APIs are now named).

(TBR'ing OWNERS because this is a mechanical name change only)

[email protected],[email protected]
BUG=chromium-os:38993,chromium:179193
TEST=built chrome


Review URL: https://chromiumcodereview.appspot.com/12381026

git-svn-id: svn://svn.chromium.org/chrome/trunk/src@185775 0039d316-1c4b-4281-b951-d872f2087c98
diff --git a/DEPS b/DEPS
index 9852a31..93dc546 100644
--- a/DEPS
+++ b/DEPS
@@ -550,7 +550,7 @@
     # For Linux and Chromium OS.
     "src/third_party/cros_system_api":
       Var("chromiumos_git") + "/platform/system_api.git" +
-      "@7d1185fa1b6f16d5e04fefc8be348682bad69b04",
+      "@bc8725f73a1a75ad863b73bc7a348d8bf7e8ba4e",
 
     # Note that this is different from Android's freetype repo.
     "src/third_party/freetype2/src":
diff --git a/chrome/browser/chromeos/extensions/networking_private_api.cc b/chrome/browser/chromeos/extensions/networking_private_api.cc
index a1a669b..07a3c8d 100644
--- a/chrome/browser/chromeos/extensions/networking_private_api.cc
+++ b/chrome/browser/chromeos/extensions/networking_private_api.cc
@@ -376,18 +376,19 @@
 }
 
 ////////////////////////////////////////////////////////////////////////////////
-// NetworkingPrivateVerifyAndSignCredentialsFunction
+// NetworkingPrivateVerifyAndEncryptCredentialsFunction
 
-NetworkingPrivateVerifyAndSignCredentialsFunction::
-  ~NetworkingPrivateVerifyAndSignCredentialsFunction() {
+NetworkingPrivateVerifyAndEncryptCredentialsFunction::
+  ~NetworkingPrivateVerifyAndEncryptCredentialsFunction() {
 }
 
-bool NetworkingPrivateVerifyAndSignCredentialsFunction::RunImpl() {
-  scoped_ptr<api::VerifyAndSignCredentials::Params> params =
-      api::VerifyAndSignCredentials::Params::Create(*args_);
+bool NetworkingPrivateVerifyAndEncryptCredentialsFunction::RunImpl() {
+  scoped_ptr<api::VerifyAndEncryptCredentials::Params> params =
+      api::VerifyAndEncryptCredentials::Params::Create(*args_);
   EXTENSION_FUNCTION_VALIDATE(params);
-
-  DBusThreadManager::Get()->GetShillManagerClient()->VerifyAndSignCredentials(
+  ShillManagerClient* shill_manager_client =
+      DBusThreadManager::Get()->GetShillManagerClient();
+  shill_manager_client->VerifyAndEncryptCredentials(
       params->properties.certificate,
       params->properties.public_key,
       params->properties.nonce,
@@ -395,39 +396,39 @@
       params->properties.device_serial,
       params->guid,
       base::Bind(
-          &NetworkingPrivateVerifyAndSignCredentialsFunction::ResultCallback,
+          &NetworkingPrivateVerifyAndEncryptCredentialsFunction::ResultCallback,
           this),
       base::Bind(
-          &NetworkingPrivateVerifyAndSignCredentialsFunction::ErrorCallback,
+          &NetworkingPrivateVerifyAndEncryptCredentialsFunction::ErrorCallback,
           this));
   return true;
 }
 
-void NetworkingPrivateVerifyAndSignCredentialsFunction::ResultCallback(
+void NetworkingPrivateVerifyAndEncryptCredentialsFunction::ResultCallback(
     const std::string& result) {
-  results_ = api::VerifyAndSignCredentials::Results::Create(result);
+  results_ = api::VerifyAndEncryptCredentials::Results::Create(result);
   SendResponse(true);
 }
 
-void NetworkingPrivateVerifyAndSignCredentialsFunction::ErrorCallback(
+void NetworkingPrivateVerifyAndEncryptCredentialsFunction::ErrorCallback(
     const std::string& error_name, const std::string& error) {
   error_ = error_name;
   SendResponse(false);
 }
 
 ////////////////////////////////////////////////////////////////////////////////
-// NetworkingPrivateVerifyAndSignDataFunction
+// NetworkingPrivateVerifyAndEncryptDataFunction
 
-NetworkingPrivateVerifyAndSignDataFunction::
-  ~NetworkingPrivateVerifyAndSignDataFunction() {
+NetworkingPrivateVerifyAndEncryptDataFunction::
+  ~NetworkingPrivateVerifyAndEncryptDataFunction() {
 }
 
-bool NetworkingPrivateVerifyAndSignDataFunction::RunImpl() {
-  scoped_ptr<api::VerifyAndSignData::Params> params =
-      api::VerifyAndSignData::Params::Create(*args_);
+bool NetworkingPrivateVerifyAndEncryptDataFunction::RunImpl() {
+  scoped_ptr<api::VerifyAndEncryptData::Params> params =
+      api::VerifyAndEncryptData::Params::Create(*args_);
   EXTENSION_FUNCTION_VALIDATE(params);
 
-  DBusThreadManager::Get()->GetShillManagerClient()->VerifyAndSignData(
+  DBusThreadManager::Get()->GetShillManagerClient()->VerifyAndEncryptData(
       params->properties.certificate,
       params->properties.public_key,
       params->properties.nonce,
@@ -435,21 +436,21 @@
       params->properties.device_serial,
       params->data,
       base::Bind(
-          &NetworkingPrivateVerifyAndSignDataFunction::ResultCallback,
+          &NetworkingPrivateVerifyAndEncryptDataFunction::ResultCallback,
           this),
       base::Bind(
-          &NetworkingPrivateVerifyAndSignDataFunction::ErrorCallback,
+          &NetworkingPrivateVerifyAndEncryptDataFunction::ErrorCallback,
           this));
   return true;
 }
 
-void NetworkingPrivateVerifyAndSignDataFunction::ResultCallback(
+void NetworkingPrivateVerifyAndEncryptDataFunction::ResultCallback(
     const std::string& result) {
-  results_ = api::VerifyAndSignData::Results::Create(result);
+  results_ = api::VerifyAndEncryptData::Results::Create(result);
   SendResponse(true);
 }
 
-void NetworkingPrivateVerifyAndSignDataFunction::ErrorCallback(
+void NetworkingPrivateVerifyAndEncryptDataFunction::ErrorCallback(
     const std::string& error_name, const std::string& error) {
   error_ = error_name;
   SendResponse(false);
diff --git a/chrome/browser/chromeos/extensions/networking_private_api.h b/chrome/browser/chromeos/extensions/networking_private_api.h
index 17662771..9ae9221b 100644
--- a/chrome/browser/chromeos/extensions/networking_private_api.h
+++ b/chrome/browser/chromeos/extensions/networking_private_api.h
@@ -138,16 +138,16 @@
   DISALLOW_COPY_AND_ASSIGN(NetworkingPrivateVerifyDestinationFunction);
 };
 
-// Implements the chrome.networkingPrivate.verifyAndSignCredentials method.
-class NetworkingPrivateVerifyAndSignCredentialsFunction
+// Implements the chrome.networkingPrivate.verifyAndEncryptCredentials method.
+class NetworkingPrivateVerifyAndEncryptCredentialsFunction
     : public AsyncExtensionFunction {
  public:
-  NetworkingPrivateVerifyAndSignCredentialsFunction() {}
-  DECLARE_EXTENSION_FUNCTION("networkingPrivate.verifyAndSignCredentials",
-                             NETWORKINGPRIVATE_VERIFYANDSIGNCREDENTIALS);
+  NetworkingPrivateVerifyAndEncryptCredentialsFunction() {}
+  DECLARE_EXTENSION_FUNCTION("networkingPrivate.verifyAndEncryptCredentials",
+                             NETWORKINGPRIVATE_VERIFYANDENCRYPTCREDENTIALS);
 
  protected:
-  virtual ~NetworkingPrivateVerifyAndSignCredentialsFunction();
+  virtual ~NetworkingPrivateVerifyAndEncryptCredentialsFunction();
 
   // AsyncExtensionFunction overrides.
   virtual bool RunImpl() OVERRIDE;
@@ -156,19 +156,20 @@
   void ErrorCallback(const std::string& error_name, const std::string& error);
 
  private:
-  DISALLOW_COPY_AND_ASSIGN(NetworkingPrivateVerifyAndSignCredentialsFunction);
+  DISALLOW_COPY_AND_ASSIGN(
+      NetworkingPrivateVerifyAndEncryptCredentialsFunction);
 };
 
-// Implements the chrome.networkingPrivate.verifyAndSignData method.
-class NetworkingPrivateVerifyAndSignDataFunction
+// Implements the chrome.networkingPrivate.verifyAndEncryptData method.
+class NetworkingPrivateVerifyAndEncryptDataFunction
     : public AsyncExtensionFunction {
  public:
-  NetworkingPrivateVerifyAndSignDataFunction() {}
-  DECLARE_EXTENSION_FUNCTION("networkingPrivate.verifyAndSignData",
-                             NETWORKINGPRIVATE_VERIFYANDSIGNDATA);
+  NetworkingPrivateVerifyAndEncryptDataFunction() {}
+  DECLARE_EXTENSION_FUNCTION("networkingPrivate.verifyAndEncryptData",
+                             NETWORKINGPRIVATE_VERIFYANDENCRYPTDATA);
 
  protected:
-  virtual ~NetworkingPrivateVerifyAndSignDataFunction();
+  virtual ~NetworkingPrivateVerifyAndEncryptDataFunction();
 
   // AsyncExtensionFunction overrides.
   virtual bool RunImpl() OVERRIDE;
@@ -177,7 +178,7 @@
   void ErrorCallback(const std::string& error_name, const std::string& error);
 
  private:
-  DISALLOW_COPY_AND_ASSIGN(NetworkingPrivateVerifyAndSignDataFunction);
+  DISALLOW_COPY_AND_ASSIGN(NetworkingPrivateVerifyAndEncryptDataFunction);
 };
 
 #endif  // CHROME_BROWSER_CHROMEOS_EXTENSIONS_NETWORKING_PRIVATE_API_H_
diff --git a/chrome/browser/chromeos/extensions/networking_private_apitest.cc b/chrome/browser/chromeos/extensions/networking_private_apitest.cc
index c49ff0c..40cf2ee 100644
--- a/chrome/browser/chromeos/extensions/networking_private_apitest.cc
+++ b/chrome/browser/chromeos/extensions/networking_private_apitest.cc
@@ -73,13 +73,13 @@
 }
 
 IN_PROC_BROWSER_TEST_F(ExtensionNetworkingPrivateApiTest,
-                       VerifyAndSignCredentials) {
-  EXPECT_TRUE(RunNetworkingSubtest("verifyAndSignCredentials")) << message_;
+                       VerifyAndEncryptCredentials) {
+  EXPECT_TRUE(RunNetworkingSubtest("verifyAndEncryptCredentials")) << message_;
 }
 
 IN_PROC_BROWSER_TEST_F(ExtensionNetworkingPrivateApiTest,
-                       VerifyAndSignData) {
-  EXPECT_TRUE(RunNetworkingSubtest("verifyAndSignData")) << message_;
+                       VerifyAndEncryptData) {
+  EXPECT_TRUE(RunNetworkingSubtest("verifyAndEncryptData")) << message_;
 }
 
 
diff --git a/chrome/browser/extensions/extension_function_histogram_value.h b/chrome/browser/extensions/extension_function_histogram_value.h
index 4aeb4355..d1babe8 100644
--- a/chrome/browser/extensions/extension_function_histogram_value.h
+++ b/chrome/browser/extensions/extension_function_histogram_value.h
@@ -480,8 +480,8 @@
   DEVELOPERPRIVATE_CHOOSEPATH,
   DEVELOPERPRIVATE_PACKDIRECTORY,
   NETWORKINGPRIVATE_VERIFYDESTINATION,
-  NETWORKINGPRIVATE_VERIFYANDSIGNCREDENTIALS,
-  NETWORKINGPRIVATE_VERIFYANDSIGNDATA,
+  NETWORKINGPRIVATE_VERIFYANDENCRYPTCREDENTIALS,
+  NETWORKINGPRIVATE_VERIFYANDENCRYPTDATA,
   DEVELOPERPRIVATE_RESTART,
   DEVELOPERPRIVATE_ALLOWINCOGNITO,
   INPUT_IME_DELETESURROUNDINGTEXT,
diff --git a/chrome/common/extensions/api/networking_private.json b/chrome/common/extensions/api/networking_private.json
index 3130d32..53ecbc9cf 100644
--- a/chrome/common/extensions/api/networking_private.json
+++ b/chrome/common/extensions/api/networking_private.json
@@ -39,7 +39,7 @@
             "type": "string",
             "description": "A string containing the serial number of the device."
           }
-        }        
+        }
       }
     ],
     "functions": [
@@ -148,7 +148,7 @@
         ]
       },
       {
-        "name": "verifyAndSignCredentials",
+        "name": "verifyAndEncryptCredentials",
         "description": "Verifies that the device is a trusted device and retrieves encrypted network credentials.",
         "parameters": [
           {
@@ -175,7 +175,7 @@
         ]
       },
       {
-        "name": "verifyAndSignData",
+        "name": "verifyAndEncryptData",
         "description": "Verifies that the device is a trusted device and encrypts supplied data with device public key.",
         "parameters": [
           {
diff --git a/chrome/test/data/extensions/api_test/networking/test.js b/chrome/test/data/extensions/api_test/networking/test.js
index c1c827c3..420e25e1 100644
--- a/chrome/test/data/extensions/api_test/networking/test.js
+++ b/chrome/test/data/extensions/api_test/networking/test.js
@@ -197,16 +197,16 @@
         assertTrue(isValid);
       }));
   },
-  function verifyAndSignCredentials() {
-    chrome.networkingPrivate.verifyAndSignCredentials(
+  function verifyAndEncryptCredentials() {
+    chrome.networkingPrivate.verifyAndEncryptCredentials(
       verificationProperties,
       "guid",
       callbackPass(function(result) {
         assertEq("encrypted_credentials", result);
       }));
   },
-  function verifyAndSignData() {
-    chrome.networkingPrivate.verifyAndSignData(
+  function verifyAndEncryptData() {
+    chrome.networkingPrivate.verifyAndEncryptData(
       verificationProperties,
       "data",
       callbackPass(function(result) {
diff --git a/chromeos/dbus/mock_shill_manager_client.h b/chromeos/dbus/mock_shill_manager_client.h
index 5536870d..61791686 100644
--- a/chromeos/dbus/mock_shill_manager_client.h
+++ b/chromeos/dbus/mock_shill_manager_client.h
@@ -51,7 +51,7 @@
                                        const std::string& device_serial,
                                        const BooleanCallback& callback,
                                        const ErrorCallback& error_callback));
-  MOCK_METHOD8(VerifyAndSignCredentials,
+  MOCK_METHOD8(VerifyAndEncryptCredentials,
                void(const std::string& certificate,
                     const std::string& public_key,
                     const std::string& nonce,
@@ -60,7 +60,7 @@
                     const std::string& service_path,
                     const StringCallback& callback,
                     const ErrorCallback& error_callback));
-  MOCK_METHOD8(VerifyAndSignData, void(const std::string& certificate,
+  MOCK_METHOD8(VerifyAndEncryptData, void(const std::string& certificate,
                                        const std::string& public_key,
                                        const std::string& nonce,
                                        const std::string& signed_data,
diff --git a/chromeos/dbus/shill_manager_client.cc b/chromeos/dbus/shill_manager_client.cc
index 5ef8556..04d7bcf 100644
--- a/chromeos/dbus/shill_manager_client.cc
+++ b/chromeos/dbus/shill_manager_client.cc
@@ -189,7 +189,7 @@
                                                error_callback);
   }
 
-  virtual void VerifyAndSignCredentials(
+  virtual void VerifyAndEncryptCredentials(
       const std::string& certificate,
       const std::string& public_key,
       const std::string& nonce,
@@ -199,7 +199,7 @@
       const StringCallback& callback,
       const ErrorCallback& error_callback) OVERRIDE {
     dbus::MethodCall method_call(flimflam::kFlimflamManagerInterface,
-                                 shill::kVerifyAndSignCredentialsFunction);
+                                 shill::kVerifyAndEncryptCredentialsFunction);
     dbus::MessageWriter writer(&method_call);
     writer.AppendString(certificate);
     writer.AppendString(public_key);
@@ -212,7 +212,7 @@
                                               error_callback);
   }
 
-  virtual void VerifyAndSignData(const std::string& certificate,
+  virtual void VerifyAndEncryptData(const std::string& certificate,
                                  const std::string& public_key,
                                  const std::string& nonce,
                                  const std::string& signed_data,
@@ -221,7 +221,7 @@
                                  const StringCallback& callback,
                                  const ErrorCallback& error_callback) OVERRIDE {
     dbus::MethodCall method_call(flimflam::kFlimflamManagerInterface,
-                                 shill::kVerifyAndSignDataFunction);
+                                 shill::kVerifyAndEncryptDataFunction);
     dbus::MessageWriter writer(&method_call);
     writer.AppendString(certificate);
     writer.AppendString(public_key);
diff --git a/chromeos/dbus/shill_manager_client.h b/chromeos/dbus/shill_manager_client.h
index 899ccef3..db40be3e 100644
--- a/chromeos/dbus/shill_manager_client.h
+++ b/chromeos/dbus/shill_manager_client.h
@@ -142,7 +142,7 @@
   // return the encrypted credentials for connecting to the network represented
   // by the given |service_path|, encrypted using the |public_key| for the
   // trusted device. If the device is not trusted, return the empty string.
-  virtual void VerifyAndSignCredentials(
+  virtual void VerifyAndEncryptCredentials(
       const std::string& certificate,
       const std::string& public_key,
       const std::string& nonce,
@@ -155,7 +155,7 @@
   // Verify that the given data corresponds to a trusted device, and return the
   // |data| encrypted using the |public_key| for the trusted device. If the
   // device is not trusted, return the empty string.
-  virtual void VerifyAndSignData(const std::string& certificate,
+  virtual void VerifyAndEncryptData(const std::string& certificate,
                                  const std::string& public_key,
                                  const std::string& nonce,
                                  const std::string& signed_data,
diff --git a/chromeos/dbus/shill_manager_client_stub.cc b/chromeos/dbus/shill_manager_client_stub.cc
index 7cad8b1..9132e9e9 100644
--- a/chromeos/dbus/shill_manager_client_stub.cc
+++ b/chromeos/dbus/shill_manager_client_stub.cc
@@ -186,7 +186,7 @@
       FROM_HERE, base::Bind(callback, true));
 }
 
-void ShillManagerClientStub::VerifyAndSignCredentials(
+void ShillManagerClientStub::VerifyAndEncryptCredentials(
     const std::string& certificate,
     const std::string& public_key,
     const std::string& nonce,
@@ -201,7 +201,7 @@
       FROM_HERE, base::Bind(callback, "encrypted_credentials"));
 }
 
-void ShillManagerClientStub::VerifyAndSignData(
+void ShillManagerClientStub::VerifyAndEncryptData(
     const std::string& certificate,
     const std::string& public_key,
     const std::string& nonce,
diff --git a/chromeos/dbus/shill_manager_client_stub.h b/chromeos/dbus/shill_manager_client_stub.h
index 9bb01e1..b9e7a6a 100644
--- a/chromeos/dbus/shill_manager_client_stub.h
+++ b/chromeos/dbus/shill_manager_client_stub.h
@@ -61,7 +61,7 @@
                                  const std::string& device_serial,
                                  const BooleanCallback& callback,
                                  const ErrorCallback& error_callback) OVERRIDE;
-  virtual void VerifyAndSignCredentials(
+  virtual void VerifyAndEncryptCredentials(
       const std::string& certificate,
       const std::string& public_key,
       const std::string& nonce,
@@ -70,7 +70,7 @@
       const std::string& service_path,
       const StringCallback& callback,
       const ErrorCallback& error_callback) OVERRIDE;
-  virtual void VerifyAndSignData(const std::string& certificate,
+  virtual void VerifyAndEncryptData(const std::string& certificate,
                                  const std::string& public_key,
                                  const std::string& nonce,
                                  const std::string& signed_data,
diff --git a/chromeos/dbus/shill_manager_client_unittest.cc b/chromeos/dbus/shill_manager_client_unittest.cc
index 9ba2dd3..d1730a1 100644
--- a/chromeos/dbus/shill_manager_client_unittest.cc
+++ b/chromeos/dbus/shill_manager_client_unittest.cc
@@ -454,7 +454,7 @@
   message_loop_.RunUntilIdle();
 }
 
-TEST_F(ShillManagerClientTest, VerifyAndSignCredentials) {
+TEST_F(ShillManagerClientTest, VerifyAndEncryptCredentials) {
   // Create response.
   scoped_ptr<dbus::Response> response(dbus::Response::CreateEmpty());
   dbus::MessageWriter writer(response.get());
@@ -469,7 +469,7 @@
   arguments.push_back("device_serial");
   std::string service_path = "/";
   dbus::ObjectPath service_path_obj(service_path);
-  PrepareForMethodCall(shill::kVerifyAndSignCredentialsFunction,
+  PrepareForMethodCall(shill::kVerifyAndEncryptCredentialsFunction,
                        base::Bind(&ExpectStringArgumentsFollowedByObjectPath,
                                   arguments,
                                   service_path_obj),
@@ -478,7 +478,7 @@
 
   // Call method.
   MockErrorCallback mock_error_callback;
-  client_->VerifyAndSignCredentials(arguments[0],
+  client_->VerifyAndEncryptCredentials(arguments[0],
                                     arguments[1],
                                     arguments[2],
                                     arguments[3],
@@ -493,7 +493,7 @@
   message_loop_.RunUntilIdle();
 }
 
-TEST_F(ShillManagerClientTest, VerifyAndSignData) {
+TEST_F(ShillManagerClientTest, VerifyAndEncryptData) {
   // Create response.
   scoped_ptr<dbus::Response> response(dbus::Response::CreateEmpty());
   dbus::MessageWriter writer(response.get());
@@ -507,14 +507,14 @@
   arguments.push_back("signed_data");
   arguments.push_back("device_serial");
   arguments.push_back("data");
-  PrepareForMethodCall(shill::kVerifyAndSignDataFunction,
+  PrepareForMethodCall(shill::kVerifyAndEncryptDataFunction,
                        base::Bind(&ExpectStringArguments, arguments),
                        response.get());
 
 
   // Call method.
   MockErrorCallback mock_error_callback;
-  client_->VerifyAndSignData(arguments[0],
+  client_->VerifyAndEncryptData(arguments[0],
                              arguments[1],
                              arguments[2],
                              arguments[3],